Вы находитесь на странице: 1из 4

Writing Proposal Sample for ITC571

Muhammad Gald Teary 11611920


Student Name and ID
Project area Network security
Project name Mobile cloud computing challenges in the matter of privacy and security
Key words Security and privacy, mobile cloud computing challenges
Research Type Reviewing
1. Introduction Background Mobile cloud computing presently become trend among people. This technology make every expert
Information, try to make a better security and privacy. Emerging technologies such mobile cloud computing seem
Issues and likely to invent a new forms of assistance for students, experts and teacher. Experts found weakness
Current Solutions in mobile cloud computing for example identity theft, privacy breaching and malicious insider. To
solve this problem use dynamic data encryption strategy (Gai et al., 2016). According to Werner, J,
Westphall, C and Westphall, C (2017) use dynamic registering with privacy to stop privacy breaching and
identity theft.
Shortcomings/ The security and privacy method can handle the problem. There might be some difficulties that are
limitations in the stopping hacker from engaging with this new technology.
current /existing
solutions
Importance of 3. Identify the need for the research (What are some important reasons for solving this problem? Why do you need to
solving this solve it?)
problem
To improve security and privacy in mobile cloud computing so user can feel safe because they do not
need to worry hacker stealing their data.
2. The Main aims of There is a reason for expert not to make the security not really secure. This is because the more secure a system the more
this research time consuming and difficult the user can use the system. To improve this situation this research use the dynamic
registering with privacy.

 Experts do not use this method because they need to do more research. In the previous research student who did this
research can accomplished their research, but still need a new method.
 To make it lighter and user friendly student need to use dynamic registering with privacy

© Elaine Rodrigues (adapted from different proposals submitted in 201630) 2018_CSU Sydney Study Centre
3. A Brief Description
of Your Proposal
 The main problem is secure management of identities and compromising data privacy, presently people do not
aware about privacy. For example facebook sold their user data to company that want to buy their data.
 People who aware of their privacy they use secure application such as google authenticator or 2 factor
authentication. This method will help them to secure their data privacy. The application will authenticating user
from their account send a code to their phone with short message service or phone call.
 Mobile cloud computing have a big weakness, its identity theft. The way that hacker use to get the data with brute
force, phising or social engineering.
 The latest authenticating method that people use in Australia is voice authenticating (Sloane, T. 2018).

Please see diagram of proposal at the end


4. The Process or You need to write step by step what you are going to do in your project.
Methodology of Your
Project 1) Literature Review (LR)
 The issues that happened in mobile cloud computing security and privacy are privacy breach, identity theft and
identity management. To solve this problem in the previous research, they use dynamic registering method and
dynamic data encryption strategies.
 The best solution is to make user realise the awareness of their privacy. Because if researcher always keep find
new method without user realised the danger that can come, it will be not good.
 The weakness of previous solution is they need to do deeper research. To do that student need to see all
problem that happened in Australia.

2) Survey
 Mobile cloud computing security and privacy survey
Do you comfortable with high security and privacy in your mobile cloud computing?
How does it affecting your daily activities while using your mobile?
Is your data security important to you?
What do you think about the problem that can happened without this method?
Do you want the user set their own privacy?
What is the best way to protect your data?
 Participants will be teachers and parents
 Questions will include open-ended and close-ended questions

3) Propose enhanced framework


 Analyse Primary and Secondary Sources
© Elaine Rodrigues (adapted from different proposals submitted in 201630) 2018_CSU Sydney Study Centre
 Suggest ways to overcome limitations in current frameworks and improve effectiveness of erasable pens among
people with learning disabilities

5. Expected Outcomes 1. Improving privacy and security for mobile cloud computing.
2. Assisting user from privacy breaching and identity theft (social engineering or brute force).
3. Providing businesses that security and privacy in Australia relevant information from the dangerous of application
in a website or social media.
Reference list

Gai, K., Qiu, M., Zhao, H., Xiong, J., 2016. Privacy-aware adaptive data encryption strategy of big data in cloud computing, in Cyber
Security and Cloud Computing (CSCloud), 2016 IEEE. In: Proceedings of the 3rd International Conference on, pp. 273–278.

Werner, J., Westphall, CM and Westphall CB. Cloud identity management: A survey on privacy strategies. Journal of Network and
Computer Applications 122 (2017) pp. 29–42

Mollah, MB., Azad, MdAK and Vasilakos, A. 2017. Security and privacy challenges in mobile cloud computing: Survey and way ahead.
Journal of Network and Computer Applications 84 (2017) 38–54

Sloane, T., 2018. Voice authentication usage growing Australia multi factor authentication is what we need.
http://paymentsjournal.com/voice-authentication-usage-growing-australia-multi-factor-authentication-need/

© Elaine Rodrigues (adapted from different proposals submitted in 201630) 2018_CSU Sydney Study Centre
© Elaine Rodrigues (adapted from different proposals submitted in 201630) 2018_CSU Sydney Study Centre

Вам также может понравиться